ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From theory to practice"
☆16Aug 31, 2023Updated 2 years ago
Alternatives and similar repositories for tep-attack-simulator
Users that are interested in tep-attack-simulator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the Network Flow Generator for ICSSIM☆17Aug 28, 2025Updated 7 months ago
- Code repository for the second edition of "Beginning Anomaly Detection Using Python-Based Deep Learning"☆24Jan 5, 2024Updated 2 years ago
- Apktool in Kali Linux, Termux, Ubuntu, Parrot OS maintained by EFX Tv☆19Jan 26, 2026Updated 2 months ago
- Digital Twin for Water Distribution Systems. A work by the SUTD Critical Infrastructure Systems Lab, TU Delft, CISPA, and iTrust☆63Sep 18, 2025Updated 6 months ago
- DeepTraLog: Trace-Log Combined Microservice Anomaly Detection through Graph-based Deep Learning☆13Mar 24, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- ASR, End-to-End, end2end, Speech Recognition, 端到端语音识别☆12Oct 25, 2020Updated 5 years ago
- UMASploit - ClearEnergy modules☆16Apr 14, 2017Updated 9 years ago
- ReSonate: A framework for runtime risk assessment of autonomous cyber-physical systems☆11Jul 4, 2021Updated 4 years ago
- program course for haidian fellowship☆10Apr 15, 2021Updated 4 years ago
- SetWinEventHook Sample☆50Sep 23, 2023Updated 2 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆30Jun 26, 2023Updated 2 years ago
- Extrae ip de numeros de telefono☆10Aug 28, 2023Updated 2 years ago
- Implementation of paper "Transferring Robustness for Graph Neural Network Against Poisoning Attacks".☆20Feb 26, 2020Updated 6 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Documentación sobre sistemas embebidos☆13Nov 15, 2024Updated last year
- Bits of Terraform that you can use to do bad things in CI/CD pipelines that run Terraform☆10Nov 10, 2020Updated 5 years ago
- collect☆18Mar 29, 2020Updated 6 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Retrieve all mails of users related to a git repository, a git user or a git organization☆57May 1, 2024Updated last year
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- Hardware PenTesting ToolKit for RPi and Arduino☆19Jun 12, 2020Updated 5 years ago
- 工控态势感知工具 Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks…☆10Sep 10, 2017Updated 8 years ago
- ☆11May 10, 2019Updated 6 years ago
- We propose Endpoint Forecasting and Interpreting (EFI), a real-time attack forecast and interpretation system, which can automatically pr…☆15Aug 16, 2023Updated 2 years ago
- ☆10May 22, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- an exploit tool for Thinkcmf RCE vulnerable☆14Feb 5, 2020Updated 6 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Reverse engineering tool using bioinformatics sequence alignment algorithms☆26Mar 5, 2021Updated 5 years ago
- ☆10Mar 4, 2026Updated last month
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago